The Liquid Web

Okay, so it’s a bit of a taboo subject, but we might as well get it over and done with. Last year we sort of jingly wrote about the Queen banning porn for 9 to 12-year-olds thinking it did not have a chance. Well, guess what… The UK government have recently introduced new legislation to block anonymous users on adult sites. In other words, you have to register to watch internet porn, which is a significant change from the current mo. The intent is to ban under-18’s from using these …

Of the many words and phrases President Donald Trump introduced into our lexicon, ‘fake news’ is probably my favorite. ‘Grab them by the pussy’ is a close second, and I have a soft spot for his tweets that end with SAD! But I digress… It’s a durable phrase, and it’s oft used for a reason. The President tapped into a well of mistrust for news media, ending with his infamous 2016 election victory. We all know what fake news means, but what can we do to avoid dodgy sources? It …

VPN leaks are bad news. Not only can they easily go unnoticed, but they also undermine the entire purpose of using a VPN tunnel. You want to be sure your VPN connection is not leaking your private information. Thankfully, LiquidVPN provides a hardened client and well-tested VPN configurations. So, when you connect to LiquidVPN’s servers, your information is going where you want it to be. Of course, that claim doesn’t mean much of you cannot test it out yourself. So, this guide will walk you through the steps that you …

Are advertisers using your microphone to spy on you? We’re all used to targeted advertising by now. If you Google a product, or read about a subject, you’re likely to get ads based on your preferences and search history. It’s a gray area morally, but at least they can be helpful occasionally. So while it’s annoying, we generally give consent for coies without much further thought. It’s a sad fact of life, but we’ve become desensitized to the ads. After all, nothing on the internet is completely free. However, accessing …

DD-WRT is a great router operating system. It’s one of the few that supports OpenVPN. So, you can configure your DD-WRT router to connect to your LiquidVPN account. Then, every device connected to your router is also connected to the VPN. That’s pretty awesome. Plus, it’s perfect for home networks with lots of streaming devices. The process isn’t very complicated, thanks to the great tools provided by both LiquidVPN and DD-WRT. It’ll only take a few minutes, so get yourself ready to get started. Generate Your OpenVPN Configuration DD-WRT is …

In a recent blog post about how to protect your on privacy and I got quite a bit of feedback on a free for the desktop app called LastPass that promises to work with any browser seamlessly and for a 12 dollar per year fee you can even set it up on your smartphones. Having to install unofficial ports of KeePass on my smartphone and tablet is something I always disliked about KeePass. So I decided to take LastPass for a spin and give you an honest comparison of the …

Think about how you use your computer. Most of the time, you have your web browser open, right? Web browsers are among the most commonly used applications across all devices. So, choosing the right one one is important. Browsers go deep. Desktop web browsers are than they appear to be. Browsers are massive programs written by huge teams of developers. In a way, they’re like a second operating system running on your computer. Web browsers need to be able to read and execute code. It’s a critical part of …

In 2013 the world was rocked by a trove of classified documents that made their way into the public eye, packed with details covering the most comprehensive international surveillance program ever constructed in modern history. Leaked by none other than the now-infamous Edward Snowden, the Snowden Leaks uncovered a massive data-mining operation undertaken by the National Security Agency in the United States, and the GCHQ in Britain. This network was designed from the ground up to record as many phone calls, es, text messages and search queries as it could, …

After Turkey had blocked access to social media in March 2014, Streisand was devised as a way to circumvent the government ban by providing secure encryption at minimal cost. It does so by allowing the user to set up a VPN via cloud services with minimal effort. If you want to keep your browsing history safe, encrypting the data is the safest way to do it. Setting up your own is a great option, and Streisand is the perfect tool for beginners and pro’s alike. The process is automated to allow …

VPN is and acronym for Virtual Private Network. VPNs virtualize a local network (LAN) over a distance. With a VPN computers in two locations work together like they are on one local network. The business applications of VPNs are obvious. Employees in different offices can resources like they’re on one local network. The data travels through the Internet inside an encrypted VPN tunnel. What does that have to to do with privacy? Of course, this guide isn’t for business applications. When a computer connects to a …